Combating temporal composition inference by high-order camouflaged network topology obfuscation

X Li, X Yang, Y Huang, Y Chen - Computers & Security, 2024 - Elsevier
Topology inference driven by non-collaborative or incomplete prior knowledge is widely
used in pivotal target network sieving and completion. However, perceivable topology also …

Consistency of Stackelberg and Nash equilibria in three-player leader-follower games

G Xu, G Chen, Z Cheng, Y Hong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
There has been significant recent interest in a class of three-player leader-follower game
models in many important cybersecurity scenarios. In such a tri-level hierarchical structure, a …

[HTML][HTML] Analytical game strategies for active UAV defense considering response delays

X Gong, W Chen, W Lei, J Wang, Z Chen, Y Li - Defence Technology, 2024 - Elsevier
In the realm of aerial warfare, the protection of Unmanned Aerial Vehicles (UAVs) against
adversarial threats is crucial. In order to balance the impact of response delays and the …

基于审计博弈的安全协作频谱感知方案

王云涛, 苏洲, 许其超, 刘怡良, 彭海霞, 栾浩 - 通信学报, 2023 - infocomm-journal.com
针对群智协作频谱感知中恶意感知终端的投毒与搭便车攻击, 结合事前威慑与事后惩罚机制提出
了一种基于审计博弈的新型防御方案. 首先, 考虑审计预算约束, 构建了一种不完全信息下的混合 …

HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model

Z Wang, J You, H Wang, T Yuan, S Lv, Y Wang… - arXiv preprint arXiv …, 2024 - arxiv.org
Honeypots, as a strategic cyber-deception mechanism designed to emulate authentic
interactions and bait unauthorized entities, continue to struggle with balancing flexibility …

TRACEGADGET: Detecting and Tracing Network Level Attack Through Federal Provenance Graph

H Liu, Y Wang, Z Su, Z Wang, Y Pan… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
Provenance graph-based auditing offers a promising direction for APT (Advanced Persistent
Threat) detection with traceability guarantees. However, most of the existing methods are …

Privacy-Preserving Trainer Recruitment in Model Marketplace of Federated Learning

Y Pan, Z Su, Y Wang - 2023 IEEE Intl Conf on Dependable …, 2023 - ieeexplore.ieee.org
Federated learning (FL) technologies enable trainers to collaboratively train machine
learning (ML) models while maintaining data privacy, making them a crucial component of …

Auction-Based Dynamic Resource Allocation in Social Metaverse

N Liu, TH Luan, Y Wang, Y Liu… - 2023 19th International …, 2023 - ieeexplore.ieee.org
The emergence of the Metaverse has brought forth a new era of social networks, offering
immersive virtual spaces for users to engage in social activities. However, the resource …

Semantic Communication Networks Empowered Artificial Intelligence of Things

Y Wang - 2024 IEEE Annual Congress on Artificial Intelligence …, 2024 - ieeexplore.ieee.org
Semantic communication aims to facilitate purposeful information exchange among diverse
intelligent entities, including humans, machines, and organisms. It emphasizes precise …

Combating Temporal Network Inference by High-Order Camouflaged Network Topology Obfuscation

X Li, X Yang, Y Huang, Y Chen - Available at SSRN 4758548 - papers.ssrn.com
Topology inference driven by non-collaborative or incomplete prior knowledge is widely
used in pivotal target network sieving and completion. However, perceivable topology also …